Notice the use of social networking charts and associative analysis used to determine nodes and persons of interest.

Also note, the extensive monitoring and exploitation of open-source web-pages, email lists and affinity group relationships.This is a very important document for the defense in the trial of the RNC-8 http://rnc8.org/about/ and should be examined by activist groups to develop effective counters and defenses.

Social networking analysis is a powerful but flawed technique if used in isolation.

The creation by a core activist group of multiple "front" or false affinity groups can be very effective in adding linkages which do not exist. Then the other groups can then be blamed for actions, used as mis-information platforms, and provide other avenues for maskirovka Russian for "The Deception") operations.